Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 136221 - media-sound/shoutcast-server-bin: script insertion vulnerability (CVE-2006-3007)
Summary: media-sound/shoutcast-server-bin: script insertion vulnerability (CVE-2006-3007)
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Security
Classification: Unclassified
Component: Vulnerabilities (show other bugs)
Hardware: All Linux
: High minor (vote)
Assignee: Gentoo Security
URL: http://secunia.com/advisories/20524/
Whiteboard: B4 [glsa] Falco
Keywords:
Depends on:
Blocks:
 
Reported: 2006-06-09 13:10 UTC by Raphael Marichez (Falco) (RETIRED)
Modified: 2006-07-09 10:37 UTC (History)
1 user (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Raphael Marichez (Falco) (RETIRED) gentoo-dev 2006-06-09 13:10:54 UTC
Hi sound team,

http://secunia.com/advisories/20524/




Software:	SHOUTcast 1.x

Description:
UZUZZ has discovered some vulnerabilities in SHOUTcast, which can be exploited by malicious users to conduct script insertion attacks.

Input passed to the "Description", "URL", "Genre", "AIM", and "ICQ" fields when defining the broadcast properties is not properly sanitised before being used. This can be exploited to inject arbitrary HTML and script code, which is executed in a user's browser session in context of an affected site when the malicious user data is viewed when accessing the main page.

Successful exploitation requires that the malicious DJ has broadcast access to the vulnerable server.

The vulnerabilities have been confirmed in version 1.9.5. Other versions may also be affected.

Solution:
Grant only trusted DJs broadcast access to a vulnerable server.

Provided and/or discovered by:
UZUZZ
Comment 1 Raphael Marichez (Falco) (RETIRED) gentoo-dev 2006-06-09 13:11:27 UTC
Waiting for a vendor patch or an official update
Comment 2 Raphael Marichez (Falco) (RETIRED) gentoo-dev 2006-06-18 04:29:48 UTC
still no upstream fix available
Comment 3 Matthias Geerdsen (RETIRED) gentoo-dev 2006-07-04 06:20:07 UTC
has this been fixed in 1.9.7 (s. Bug #136721)
Comment 4 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-07-04 11:59:23 UTC
Perhaps bundle GLSA with #136721 
Comment 5 Raphael Marichez (Falco) (RETIRED) gentoo-dev 2006-07-05 06:59:41 UTC
(In reply to comment #4)
> Perhaps bundle GLSA with #136721 
> 

yes... i think we can combine the two bugs into the GLSA.
Comment 6 Matthias Geerdsen (RETIRED) gentoo-dev 2006-07-06 06:40:43 UTC
Is this fixed in the new release though?
Comment 7 Thierry Carrez (RETIRED) gentoo-dev 2006-07-06 09:42:33 UTC
Yes, common GLSA
Comment 8 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2006-07-09 10:37:13 UTC
GLSA 200607-05